CVE-2025-2945:
pgAdmin 4 Vulnerable to Remote Code Execution
10
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.9699%
CWE
Published
4/3/2025
Updated
4/4/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
pgadmin4 | pip | < 9.2 | 9.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is clearly shown in the patch files where two functions were modified to remove direct eval() calls on user-provided input. Both functions process POST request parameters ('high_availability' and 'query_commited') that were previously passed to eval() without proper validation. The patch replaces these dangerous eval() calls with safer string comparison operations. These are the exact functions that would appear in a runtime profiler when the vulnerability is being exploited, as they directly process the malicious input before the eval() call (in vulnerable versions). The confidence is high because the patch explicitly shows the removal of eval() calls on user-controlled input in both cases.